Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention

Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention

Noted as an IGI Global Core Reference Title in Security & Forensics for 2019.

Release Date: December, 2018|Copyright: © 2019 |Pages: 281
DOI: 10.4018/978-1-5225-7628-0
ISBN13: 9781522576280|ISBN10: 1522576282|EISBN13: 9781522576297
Hardcover:
Available
$220.00
TOTAL SAVINGS: $220.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$220.00
TOTAL SAVINGS: $220.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$220.00
TOTAL SAVINGS: $220.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$220.00
TOTAL SAVINGS: $220.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$265.00
TOTAL SAVINGS: $265.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$265.00
TOTAL SAVINGS: $265.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$1,500.00
TOTAL SAVINGS: $1,500.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Effective immediately, IGI Global has discontinued softcover book production. The softcover option is no longer available for direct purchase.
Description & Coverage
Description:

In recent decades there has been incredible growth in the use of various internet applications by individuals and organizations who store sensitive information online on different servers. This greater reliance of organizations and individuals on internet technologies and applications increases the threat space and poses several challenges for implementing and maintaining cybersecurity practices.

Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention provides innovative insights into how an ethical hacking knowledge base can be used for testing and improving the network and system security posture of an organization. It is critical for each individual and institute to learn hacking tools and techniques that are used by dangerous hackers in tandem with forming a team of ethical hacking professionals to test their systems effectively. Highlighting topics including cyber operations, server security, and network statistics, this publication is designed for technical experts, students, academicians, government officials, and industry professionals.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Communication Protocols
  • Computer Networking
  • Cyber Operations
  • Cybercrime
  • Network Monitoring
  • Network Statistics
  • Operating Systems
  • Server Security
  • Shell Scripting
  • Virtual Machines
  • Wireless Hacking
Table of Contents
Search this Book:
Reset
Media
Videos:
Editor/Author Biographies

Sunita Vikrant Dhavale, presently associated with Defence Institute of Advanced Technology (DIAT), an autonomous institute under Ministry of Defence, Pune, as an Assistant Professor in Department of Computer Engineering. She received her M.E. (Computer Science and Engineering) from the Pune University in 2009 and PhD (Computer Science and Engineering) from DIAT University in 2015. She is EC-Council’s Certified Ethical Hacker (C|EH-v9), 2017. She is recipient of IETE M. N. Saha Memorial Award for her paper published in IETE Journal of Research and Outstanding Woman Achiever Award from Venus International Foundation. She is an author for the book titled Advanced Image-Based Spam Detection and Filtering Techniques, published by IGI Global in 2017. She was selected as one of the top performers in four weeks AICTE approved Faculty Development Program on ICT tools by IIT, Bombay in September 2016. She has more than 25 publications in international journals, international conference proceedings, and book chapter. Her research areas are cyber security, steganography, malware analysis, and multimedia forensics. She organized first uniquely aimed National Conference on Electronics and Computer Engineering (NCECE - 2016) with the theme: Defence Applications in DIAT from 21st-22nd Jan 2016. She worked as a project manager for campus-wide wi-fi project implementation for higher research and education in DIAT in 2012. She emphasized on active learning strategy like think-pair-share and flipped classroom approach in her classroom by creating open educational resources for her teaching subjects. She arranged several seminars, workshops, hands-on, presentation, debates, quizzes for providing the additional resources to MTech students and course improvement. She is member of many professional bodies including IEEE, ACM, ISTE, IETE, IAENG, and ISACA.

Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.